When to Use Python?

Total Page:16

File Type:pdf, Size:1020Kb

When to Use Python? Learning Python for Forensics Learn the art of designing, developing, and deploying innovative forensic solutions through Python Preston Miller Chapin Bryce BIRMINGHAM - MUMBAI Learning Python for Forensics Copyright © 2016 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: May 2016 Production reference: 1250516 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78328-523-5 www.packtpub.com Credits Authors Project Coordinator Preston Miller Judie Jose Chapin Bryce Proofreader Reviewer Safis Editing Sachin Raste Indexer Commissioning Editor Hemangini Bari Rebecca Youe Graphics Acquisition Editor Kirk D'Penha Vinay Argekar Production Coordinator Content Development Editor Shantanu N. Zagade Sanjeet Rao Cover Work Technical Editor Shantanu N. Zagade Pramod Kumavat Copy Editors Dipti Mankame Laxmi Subramanian About the Authors Preston Miller is a consultant at an internationally recognized firm that specializes in cyber investigations. Preston holds an undergraduate degree from Vassar College and a master's degree in digital forensics from Marshall University, where he was the recipient of the J. Edgar Hoover Scientific Scholarship for academic excellence. While studying in a graduate school, Preston conducted classes on Python and Open Source Forensics. Preston has previously published his research on Bitcoin through Syngress. Preston is experienced in conducting traditional Digital Forensic investigations, but specializes in Physical Forensics. Physical Forensics is a subset of Digital Forensics, which involves black box scenarios where data must be acquired from a device by non-traditional means. In his free time, Preston contributes to multiple Python-based open source projects. I would like to thank my wife, Stephanie, for her unwavering encouragement and love. I would also like to thank my family and friends for their support. I owe many thanks to Dr. Terry Fenger, Chris Vance, Robert Boggs, and John Sammons for helping me grow my understanding of the field and inspiring me to learn outside the classroom. Chapin Bryce is a professional in the digital forensics community. After studying computers and digital forensics at Champlain College, Chapin joined a firm leading the field of digital forensics and investigations. In his downtime, Chapin enjoys working on Python scripts, writing, and skiing (weather permitting). As a member of multiple ongoing research and development projects, Chapin has authored several articles in professional and academic publications. I want to thank all of my family and friends who have been incredibly supportive during the development of this book. A special thanks to my best friend and keeper of sanity, Alexa, who has helped tirelessly bring this exciting project together. Your unwavering support has made this possible. A warm thank you to my mother, father, sister, and the extended family who have supported me through the years and encouraged me to reach just a little further at every opportunity. I am also extremely grateful for the advice and guidance from my mentors, both professionally and academically, as I have grown in the field of forensics. Acknowledgments We would like to thank John Shumway, Hasan Eray Dogan, and J-Michael Roberts for their contributions to the book. We greatly appreciate their insight and expertise in all things forensics. About the Reviewer Sachin Raste is a leading security expert with over 18 years of experience in the field of network management and information security. With his team, he has designed, streamlined, and integrated networks, applications, and IT processes for some of the leading business houses in India, and he has successfully helped them achieve business continuity. You can follow him through his Twitter ID @essachin. His past reviews include Metasploit Penetration Testing Cookbook and Building Virtual Pentesting Labs for Advanced Penetration Testing, both by Packt Publishing. First and foremost, I'd like to thank my wife, my children, and my close group of friends, without whom everything in this world would have seemed impossible. I thank everyone at MalwareMustDie NPO, a group of white-hat security researchers who tackle malware, for their immense inspiration and support. www.PacktPub.com Support files, eBooks, discount offers, and more For support files and downloads related to your book, please visit www.PacktPub.com. Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at [email protected] for more details. At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks. TM https://www2.packtpub.com/books/subscription/packtlib Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can search, access, and read Packt's entire library of books. Why subscribe? • Fully searchable across every book published by Packt • Copy and paste, print, and bookmark content • On demand and accessible via a web browser Free access for Packt account holders If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view 9 entirely free books. Simply use your login credentials for immediate access. To my wife, the love of my life, whose guidance, friendship, and love makes life all the sweeter. I love you, Stephanie. – Preston Miller To my mom and dad who have lovingly and tenaciously guided me at every turn and encouraged me to passionately strive for my dreams. – Chapin Bryce Table of Contents Preface xi Chapter 1: Now For Something Completely Different 1 When to use Python? 2 Getting started 5 Standard data types 8 Strings and Unicode 9 Integers and floats 12 Booleans and None 13 Structured data types 14 Lists 14 Dictionaries 17 Sets and tuples 18 Data type conversions 19 Files 20 Variables 21 Understanding scripting flow logic 23 Conditionals 24 Loops 27 For 27 While 28 Functions 29 Summary 31 [ i ] Table of Contents Chapter 2: Python Fundamentals 33 Advanced data types and functions 33 Iterators 34 Datetime objects 36 Libraries 38 Installing third-party libraries 38 Libraries in this book 39 Python packages 39 Classes and object-oriented programming 40 Try and except 42 Raise 45 Creating our first script – unix_converter.py 47 User input 49 Using the raw input method and the system module – user_input.py 49 Understanding Argparse – argument_parser.py 51 Forensic scripting best practices 54 Developing our first forensic script – usb_lookup.py 56 Understanding the main() function 58 Exploring the getRecord() function 61 Interpreting the searchKey() function 62 Running our first forensic script 64 Troubleshooting 64 Challenge 66 Summary 66 Chapter 3: Parsing Text Files 67 Setup API 68 Introducing our script 68 Overview 68 Our first iteration – setupapi_parser.v1.py 69 Designing the main() function 71 Crafting the parseSetupapi() function 72 Developing the printOutput() function 74 Running the script 75 Our second iteration – setupapi_parser.v2.py 75 Improving the main() function 77 Tuning the parseSetupapi() function 79 Modifying the printOutput() function 80 Running the script 81 Our final iteration – setupapi_parser.py 82 Extending the main() function 84 [ ii ] Table of Contents Adding to the parseSetupapi() function 85 Creating the parseDeviceInfo() function 87 Forming the prepUSBLookup() function 89 Constructing the getDeviceNames() function 89 Enhancing the printOutput() function 90 Running the script 91 Additional challenges 92 Summary 92 Chapter 4: Working with Serialized Data Structures 93 Serialized data structures 94 A simple Bitcoin Web API 97 Our first iteration – bitcoin_address_lookup.v1.py 100 Exploring the main() function 102 Understanding the getAddress() function 102 Working with the printTransactions() function 103 The printHeader() helper function 105 The getInputs() helper function 106 Running the script 107 Our second iteration – bitcoin_address_lookup.v2.py 108 Modifying the main() function 111 Improving the getAddress() function 112 Elaborating on the printTransactions() function 112 Running the script 113 Mastering our final iteration – bitcoin_address_lookup.py 114 Enhancing the parseTransactions() function 117 Developing the csvWriter() function 119 Running the script 120 Additional challenges 121 Summary 122 Chapter 5: Databases in Python 123 An overview of databases 123 Using SQLite3
Recommended publications
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • A Modern Introduction to Programming
    Eloquent JavaScript A Modern Introduction to Programming Marijn Haverbeke Copyright © 2014 by Marijn Haverbeke This work is licensed under a Creative Commons attribution-noncommercial license (http://creativecommons.org/licenses/by-nc/3.0/). All code in the book may also be considered licensed under an MIT license (http://opensource. org/licenses/MIT). The illustrations are contributed by various artists: Cover by Wasif Hyder. Computer (introduction) and unicycle people (Chapter 21) by Max Xiantu. Sea of bits (Chapter 1) and weresquirrel (Chapter 4) by Margarita Martínez and José Menor. Octopuses (Chapter 2 and 4) by Jim Tierney. Object with on/off switch (Chapter 6) by Dyle MacGre- gor. Regular expression diagrams in Chapter 9 generated with regex- per.com by Jeff Avallone. Game concept for Chapter 15by Thomas Palef. Pixel art in Chapter 16 by Antonio Perdomo Pastor. The second edition of Eloquent JavaScript was made possible by 454 financial backers. You can buy a print version of this book, with an extra bonus chapter included, printed by No Starch Press at http://www.amazon.com/gp/product/ 1593275846/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN= 1593275846&linkCode=as2&tag=marijhaver-20&linkId=VPXXXSRYC5COG5R5. i Contents On programming .......................... 2 Why language matters ....................... 5 What is JavaScript? ......................... 9 Code, and what to do with it ................... 11 Overview of this book ........................ 12 Typographic conventions ...................... 14 1 Values, Types, and Operators 15 Values ................................. 16 Numbers ............................... 17 Strings ................................ 21 Unary operators ........................... 22 Boolean values ............................ 23 Undefined values ........................... 26 Automatic type conversion ..................... 27 Summary ............................... 30 2 Program Structure 32 Expressions and statements .................... 32 Variables ..............................
    [Show full text]
  • Archive Utility Download
    archive utility download mac Question: Q: finding archive utility app and uninstalling winzip? i have zip files that now default to WINZIP which i downloaded for a demo and never uninstalled. can someone remind me how to uninstall it again? ALSO, i am trying to set ZIPPED files to open with ARCHIVE UTILITY but i don't see anywhere to set this with the OPEN WITH dialogs. i checked in the UTILITY FOLDER in applications but it is not there. i forget if this is something obvious or what. Mac Pro, macOS 10.13. Posted on Jul 15, 2020 11:46 AM. Anyone who has purchased the product from the WinZip store* within 30 days can get a refund of the purchase price. If you want to arrange a refund, please contact WinZip Service or mail a request to: Mansfield, CT 06268-0540. Please include your name, order number, and postal address in your request. To qualify for a refund, please remove the software from any computers on which you've installed it. Also, please destroy the CD, if you received one. The best way to remove WinZip Mac from your computer is as follows: Click the WinZip icon on the dock Click the WinZip drop down menu and then the Uninstall menu item. Then contact WinZip Service, state that you have removed the software from any computers on which you've installed it (and have destroyed the CD if applicable), and also state that you will no longer be using the software. * Note: If you have purchased WinZip through the Apple Store and believe you are in need of a refund, you must contact the Apple Store.
    [Show full text]
  • 5. Data Types
    IEEE FOR THE FUNCTIONAL VERIFICATION LANGUAGE e Std 1647-2011 5. Data types The e language has a number of predefined data types, including the integer and Boolean scalar types common to most programming languages. In addition, new scalar data types (enumerated types) that are appropriate for programming, modeling hardware, and interfacing with hardware simulators can be created. The e language also provides a powerful mechanism for defining OO hierarchical data structures (structs) and ordered collections of elements of the same type (lists). The following subclauses provide a basic explanation of e data types. 5.1 e data types Most e expressions have an explicit data type, as follows: — Scalar types — Scalar subtypes — Enumerated scalar types — Casting of enumerated types in comparisons — Struct types — Struct subtypes — Referencing fields in when constructs — List types — The set type — The string type — The real type — The external_pointer type — The “untyped” pseudo type Certain expressions, such as HDL objects, have no explicit data type. See 5.2 for information on how these expressions are handled. 5.1.1 Scalar types Scalar types in e are one of the following: numeric, Boolean, or enumerated. Table 17 shows the predefined numeric and Boolean types. Both signed and unsigned integers can be of any size and, thus, of any range. See 5.1.2 for information on how to specify the size and range of a scalar field or variable explicitly. See also Clause 4. 5.1.2 Scalar subtypes A scalar subtype can be named and created by using a scalar modifier to specify the range or bit width of a scalar type.
    [Show full text]
  • Introduction to Docker Version: A2622f1
    Introduction to Docker Version: a2622f1 An Open Platform to Build, Ship, and Run Distributed Applications Docker Fundamentals a2622f1 1 © 2015 Docker Inc Logistics • Updated copy of the slides: http://lisa.dckr.info/ • I'm Jérôme Petazzoni • I work for Docker Inc. • You should have a little piece of paper, with your training VM IP address + credentials • Can't find the paper? Come get one here! • We will make a break halfway through • Don't hesitate to use the LISA Slack (#docker channel) • This will be fast-paced, but DON'T PANIC • To contact me: [email protected] / Twitter: @jpetazzo Those slides were made possible by Leon Licht, Markus Meinhardt, Ninette, Yetti Messner, and a plethora of other great artist of the Berlin techno music scene, alongside with what is probably an unhealthy amount of Club Mate. Docker Fundamentals a2622f1 2 © 2015 Docker Inc Part 1 • About Docker • Your training Virtual Machine • Install Docker • Our First Containers • Background Containers • Restarting and Attaching to Containers • Understanding Docker Images • Building Docker images • A quick word about the Docker Hub Docker Fundamentals a2622f1 3 © 2015 Docker Inc Part 2 • Naming and inspecting containers • Container Networking Basics • Local Development Work flow with Docker • Working with Volumes • Connecting Containers • Ambassadors • Compose For Development Stacks Docker Fundamentals a2622f1 4 © 2015 Docker Inc Extra material • Advanced Dockerfiles • Security • Dealing with Vulnerabilities • Securing Docker with TLS • The Docker API Docker Fundamentals
    [Show full text]
  • SQL Server on Linux
    SQL Server on Linux Configuring and administering Microsoft's database solution Jasmin Azemović BIRMINGHAM - MUMBAI SQL Server on Linux Copyright © 2017 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: August 2017 Production reference: 1100817 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78829-180-4 www.packtpub.com Credits Author Copy Editor Jasmin Azemović Safis Editing Reviewer Project Coordinator Marek Chmel Nidhi Joshi Commissioning Editor Proofreader Amey Varangaonkar Safis Editing Acquisition Editor Indexer Tushar Gupta Pratik Shirodkar Content Development Editor Graphics Cheryl Dsa Tania Dutta Technical Editor Production Coordinator Prasad Ramesh Melwyn Dsa About the Author Jasmin Azemović is a university professor active in the database systems, information security, data privacy, forensic analysis, and fraud detection fields.
    [Show full text]
  • Occam 2.1 Reference Manual
    occam 2.1 reference manual SGS-THOMSON Microelectronics Limited May 12, 1995 iv occam 2.1 REFERENCE MANUAL SGS-THOMSON Microelectronics Limited First published 1988 by Prentice Hall International (UK) Ltd as the occam 2 Reference Manual. SGS-THOMSON Microelectronics Limited 1995. SGS-THOMSON Microelectronics reserves the right to make changes in specifications at any time and without notice. The information furnished by SGS-THOMSON Microelectronics in this publication is believed to be accurate, but no responsibility is assumed for its use, nor for any infringement of patents or other rights of third parties resulting from its use. No licence is granted under any patents, trademarks or other rights of SGS-THOMSON Microelectronics. The INMOS logo, INMOS, IMS and occam are registered trademarks of SGS-THOMSON Microelectronics Limited. Document number: 72 occ 45 03 All rights reserved. No part of this publication may be reproduced, stored in a retrival system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission, in writing, from SGS-THOMSON Microelectronics Limited. Contents Contents v Contents overview ix Preface xi Introduction 1 Syntax and program format 3 1 Primitive processes 5 1.1 Assignment 5 1.2 Communication 6 1.3 SKIP and STOP 7 2 Constructed processes 9 2.1 Sequence 9 2.2 Conditional 11 2.3 Selection 13 2.4 WHILE loop 14 2.5 Parallel 15 2.6 Alternation 19 2.7 Processes 24 3 Data types 25 3.1 Primitive data types 25 3.2 Named data types 26 3.3 Literals
    [Show full text]
  • Floating-Point Exception Handing
    ISO/IEC JTC1/SC22/WG5 N1372 Working draft of ISO/IEC TR 15580, second edition Information technology ± Programming languages ± Fortran ± Floating-point exception handing This page to be supplied by ISO. No changes from first edition, except for for mechanical things such as dates. i ISO/IEC TR 15580 : 1998(E) Draft second edition, 13th August 1999 ISO/IEC Foreword To be supplied by ISO. No changes from first edition, except for for mechanical things such as dates. ii ISO/IEC Draft second edition, 13th August 1999 ISO/IEC TR 15580: 1998(E) Introduction Exception handling is required for the development of robust and efficient numerical software. In particular, it is necessary in order to be able to write portable scientific libraries. In numerical Fortran programming, current practice is to employ whatever exception handling mechanisms are provided by the system/vendor. This clearly inhibits the production of fully portable numerical libraries and programs. It is particularly frustrating now that IEEE arithmetic (specified by IEEE 754-1985 Standard for binary floating-point arithmetic, also published as IEC 559:1989, Binary floating-point arithmetic for microprocessor systems) is so widely used, since built into it are the five conditions: overflow, invalid, divide-by-zero, underflow, and inexact. Our aim is to provide support for these conditions. We have taken the opportunity to provide support for other aspects of the IEEE standard through a set of elemental functions that are applicable only to IEEE data types. This proposal involves three standard modules: IEEE_EXCEPTIONS contains a derived type, some named constants of this type, and some simple procedures.
    [Show full text]
  • Mark Vie Controller Standard Block Library for Public Disclosure Contents
    GEI-100682AC Mark* VIe Controller Standard Block Library These instructions do not purport to cover all details or variations in equipment, nor to provide for every possible contingency to be met during installation, operation, and maintenance. The information is supplied for informational purposes only, and GE makes no warranty as to the accuracy of the information included herein. Changes, modifications, and/or improvements to equipment and specifications are made periodically and these changes may or may not be reflected herein. It is understood that GE may make changes, modifications, or improvements to the equipment referenced herein or to the document itself at any time. This document is intended for trained personnel familiar with the GE products referenced herein. Public – This document is approved for public disclosure. GE may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not provide any license whatsoever to any of these patents. GE provides the following document and the information included therein as is and without warranty of any kind, expressed or implied, including but not limited to any implied statutory warranty of merchantability or fitness for particular purpose. For further assistance or technical information, contact the nearest GE Sales or Service Office, or an authorized GE Sales Representative. Revised: July 2018 Issued: Sept 2005 © 2005 – 2018 General Electric Company. ___________________________________ * Indicates a trademark of General
    [Show full text]
  • Adaptivfloat: a Floating-Point Based Data Type for Resilient Deep Learning Inference
    ADAPTIVFLOAT:AFLOATING-POINT BASED DATA TYPE FOR RESILIENT DEEP LEARNING INFERENCE Thierry Tambe 1 En-Yu Yang 1 Zishen Wan 1 Yuntian Deng 1 Vijay Janapa Reddi 1 Alexander Rush 2 David Brooks 1 Gu-Yeon Wei 1 ABSTRACT Conventional hardware-friendly quantization methods, such as fixed-point or integer, tend to perform poorly at very low word sizes as their shrinking dynamic ranges cannot adequately capture the wide data distributions commonly seen in sequence transduction models. We present AdaptivFloat, a floating-point inspired number representation format for deep learning that dynamically maximizes and optimally clips its available dynamic range, at a layer granularity, in order to create faithful encoding of neural network parameters. AdaptivFloat consistently produces higher inference accuracies compared to block floating-point, uniform, IEEE-like float or posit encodings at very low precision (≤ 8-bit) across a diverse set of state-of-the-art neural network topologies. And notably, AdaptivFloat is seen surpassing baseline FP32 performance by up to +0.3 in BLEU score and -0.75 in word error rate at weight bit widths that are ≤ 8-bit. Experimental results on a deep neural network (DNN) hardware accelerator, exploiting AdaptivFloat logic in its computational datapath, demonstrate per-operation energy and area that is 0.9× and 1.14×, respectively, that of equivalent bit width integer-based accelerator variants. (a) ResNet-50 Weight Histogram (b) Inception-v3 Weight Histogram 1 INTRODUCTION 105 Max Weight: 1.32 105 Max Weight: 1.27 Min Weight: -0.78 Min Weight: -1.20 4 4 Deep learning approaches have transformed representation 10 10 103 103 learning in a multitude of tasks.
    [Show full text]
  • Create ASCII Art Text Banners in GNU / Linux Console and Terminal with Figlet and Toilet
    Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Create ASCII Art Text banners in GNU / Linux console and terminal with figlet and toilet Author : admin As an old school hobbyist, I'm a kind of ASCII art freak. Free Software is just great for this text / console maniacs like me, who spend their youth years in a DOS (Disk Opearting System) command prompt. For long time, I'm researching the cool programs which has to do somehow with ASCII Art, in that relation I decided to write few ones of figlet and toilet - two nice programs capable of generating ASCII art text beautiful banners based on a typed in text string. Obviously toilet developer Sam Hocevar had a great sense of humor :) To play with figlet and toilet install them, according to (rpm or deb based package manager on distro) with yum / apt-get. yum -y install toilet figlet 1 / 6 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog .... apt-get --yes install toilet figlet .... There are no native tool packages for Slackware, so Slackaware Linux users need to compile figlet from source code - available on figlet's home page figlet.org Once figlet and toilet are installed, here is few sample use cases; hipo@noah:~/Desktop$ figlet hello world! hipo@noah:~/Desktop$ figlet -f script Merrcy Christmas Plenty of figlet font examples are available on Figlet's website example section - very cool stuff btw :) To take a quick look on all fonts available for toilet - ascii art banner creation.
    [Show full text]